General
-
Target
3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf
-
Size
4.0MB
-
Sample
221023-zzghbscfg4
-
MD5
9db55640696bc0fd1cb08568c42f5d5b
-
SHA1
89f1105462ee2003bcc44a70d9ddd00d21bb5938
-
SHA256
3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf
-
SHA512
7a9543e7bbb8d26fb35450580e7dac37cd410bc273214421a62465456365cb8ce3e780b88938927e9d3deb3f13de11b7310ea3f6424b17a41c4cf612358fd812
-
SSDEEP
98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGW:FPwT2FGGAVLXAT3RifCGW
Behavioral task
behavioral1
Sample
3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf.exe
Resource
win7-20220812-en
Malware Config
Extracted
joker
https://htuzi.oss-cn-shanghai.aliyuncs.com
Targets
-
-
Target
3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf
-
Size
4.0MB
-
MD5
9db55640696bc0fd1cb08568c42f5d5b
-
SHA1
89f1105462ee2003bcc44a70d9ddd00d21bb5938
-
SHA256
3b8f70eaccbdb1cf69ac5b5f1b7c5dc72631ab2e740e76f76e0df998d50ba2cf
-
SHA512
7a9543e7bbb8d26fb35450580e7dac37cd410bc273214421a62465456365cb8ce3e780b88938927e9d3deb3f13de11b7310ea3f6424b17a41c4cf612358fd812
-
SSDEEP
98304:FPUpwKFQhvFGd6toOUVuwXWxiTsFtJ3L1ifCGW:FPwT2FGGAVLXAT3RifCGW
-
Detect Blackmoon payload
-
Suspicious use of SetThreadContext
-